OPENSUSE-SU-2020:0388-1
Vulnerability from csaf_opensuse - Published: 2020-03-27 05:20 - Updated: 2020-03-27 05:20Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929 1164078).
- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162929 1162931).
- CVE-2020-9383: An issue was discovered in the set_fdc in drivers/block/floppy.c that lead to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2 (bnc#1165111).
- CVE-2019-19768: There was a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer) (bnc#1159285).
The following non-security bugs were fixed:
- ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1 (bsc#1111666).
- ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666).
- ALSA: hda/realtek - Add more codec supported Headset Button (bsc#1111666).
- ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666).
- ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666).
- ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294 (bsc#1111666).
- ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1 (bsc#1111666).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master (bsc#1111666).
- ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666).
- ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000 (bsc#1111666).
- ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65 headset (bsc#1111666).
- ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666).
- ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666).
- ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666).
- ALSA: usb-audio: add quirks for Line6 Helix devices fw>=2.82 (bsc#1111666).
- ALSA: usb-audio: fix Corsair Virtuoso mixer label collision (bsc#1111666).
- ALSA: usb-audio: unlock on error in probe (bsc#1111666).
- ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status (bsc#1051510).
- ASoC: dapm: Correct DAPM handling of active widgets during shutdown (bsc#1051510).
- ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path (bsc#1051510).
- ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output (bsc#1051510).
- ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510).
- ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510).
- Add CONFIG_RAID6_PQ_BENCHMARK=y in following config files for the above change,
- EDAC, ghes: Make platform-based whitelisting x86-only (bsc#1158187).
- EDAC/mc: Fix use-after-free and memleaks during device removal (bsc#1114279).
- Enable the following two patches in series.conf, and refresh the KABI patch due to previous md commit (bsc#1119680),
- HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510).
- Input: edt-ft5x06 - work around first register access error (bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510).
- Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list (bsc#1051510).
- Input: synaptics - switch T470s to RMI4 by default (bsc#1051510).
- KVM: VMX: check descriptor table exits on instruction emulation (bsc#1166104).
- NFC: pn544: Fix a typo in a debug message (bsc#1051510).
- NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use le16_add_cpu() (bsc#1051510).
- PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561).
- PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL (bsc#1161561).
- PCI/AER: Clear only ERR_FATAL status bits during fatal recovery (bsc#1161561).
- PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery (bsc#1161561).
- PCI/AER: Do not clear AER bits if error handling is Firmware-First (bsc#1161561).
- PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561).
- PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561).
- PCI/AER: Take reference on error devices (bsc#1161561).
- PCI/ERR: Run error recovery callbacks for all affected devices (bsc#1161561).
- PCI/ERR: Use slot reset if available (bsc#1161561).
- Update 'drm/i915: Wean off drm_pci_alloc/drm_pci_free' (bsc#1114279) This patch fixes ../drivers/gpu/drm/i915/i915_gem.c: In function 'i915_gem_object_get_pages_phys': ../drivers/gpu/drm/i915/i915_gem.c:232:2: warning: return makes pointer from integer without a cast [enabled by default] introduced by commit cde29f21f04985905600b14e6936f4f023329a99.
- Update config files. CONFIG_IPX was set on ARM. Disable as on other archs.
- [1/2,media] uvcvideo: Refactor teardown of uvc on USB disconnect (https://patchwork.kernel.org/patch/9683663/) (bsc#1164507)
- amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956)
- atm: zatm: Fix empty body Clang warnings (bsc#1051510).
- b43legacy: Fix -Wcast-function-type (bsc#1051510).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- bonding/alb: properly access headers in bond_alb_xmit() (networking-stable-20_02_09).
- config: enable BLK_DEV_SR_VENDOR on armv7hl (bsc#1164632)
- cpufreq: powernv: Fix unsafe notifiers (bsc#1065729).
- cpufreq: powernv: Fix use-after-free (bsc#1065729).
- crypto: pcrypt - Fix user-after-free on module unload (git-fixes).
- dmaengine: coh901318: Fix a double lock bug in dma_tc_handle() (bsc#1051510).
- driver core: Print device when resources present in really_probe() (bsc#1051510).
- driver core: platform: Prevent resouce overflow from causing infinite loops (bsc#1051510).
- driver core: platform: fix u32 greater or equal to zero comparison (bsc#1051510).
- drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).
- drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).
- drm/amd/dm/mst: Ignore payload update failures (bsc#1112178)
- drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510).
- drm/i915/gvt: Fix orphan vgpu dmabuf_objs' lifetime (git-fixes).
- drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits (git-fixes).
- drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279)
- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)
- drm/i915: Program MBUS with rmw during initialization (git-fixes).
- drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510).
- drm/nouveau/disp/nv50-: prevent oops when no channel method map provided (bsc#1051510).
- drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from fw (bsc#1051510).
- drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets (git-fixes).
- drm/sun4i: Fix DE2 VI layer format support (git-fixes).
- drm/sun4i: de2/de3: Remove unsupported VI layer formats (git-fixes).
- drm: remove the newline for CRC source name (bsc#1051510).
- fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003).
- firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes).
- firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes).
- firmware: imx: scu: Ensure sequential TX (git-fixes).
- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).
- hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Warn unknown speed message only when carrier is present (bsc#1065729).
- iommu/amd: Check feature support bit before accessing MSI capability registers (bsc#1166101).
- iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102).
- iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump (bsc#1141895).
- iommu/dma: Fix MSI reservation allocation (bsc#1166730).
- iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page (bsc#1166732).
- iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103).
- iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733).
- iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734).
- iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint (bsc#1166731).
- iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint (bsc#1166735).
- iwlegacy: Fix -Wcast-function-type (bsc#1051510).
- iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices (bsc#1166632).
- iwlwifi: mvm: Fix thermal zone registration (bsc#1051510).
- kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled (bsc#1141895).
- kexec: Allocate decrypted control pages for kdump if SME is enabled (bsc#1141895).
- lib/raid6: add missing include for raid6test (bsc#1166003).
- lib/raid6: add option to skip algo benchmarking (bsc#1166003).
- lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003).
- libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields (bsc#1165929).
- libnvdimm/pfn_dev: Do not clear device memmap area during generic namespace probe (bsc#1165929 bsc#1165950).
- libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929).
- md raid0/linear: Mark array as 'broken' and fail BIOs if a member is gone (bsc#1166003).
- md-batch-flush-requests-kabi.patch
- md-batch-flush-requests.patch
- md-bitmap: create and destroy wb_info_pool with the change of backlog (bsc#1166003).
- md-bitmap: create and destroy wb_info_pool with the change of bitmap (bsc#1166003).
- md-bitmap: small cleanups (bsc#1166003).
- md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during reshaping stage (bsc#1166003).
- md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003).
- md-cluster/raid10: do not call remove_and_add_spares during reshaping stage (bsc#1166003).
- md-cluster/raid10: resize all the bitmaps before start reshape (bsc#1166003).
- md-cluster/raid10: support add disk under grow mode (bsc#1166003).
- md-cluster: introduce resync_info_get interface for sanity check (bsc#1166003).
- md-cluster: remove suspend_info (bsc#1166003).
- md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted (bsc#1166003).
- md-linear: use struct_size() in kzalloc() (bsc#1166003).
- md/bitmap: avoid race window between md_bitmap_resize and bitmap_file_clear_bit (bsc#1166003).
- md/bitmap: use mddev_suspend/resume instead of ->quiesce() (bsc#1166003).
- md/raid0: Fix an error message in raid0_make_request() (bsc#1166003).
- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1166003).
- md/raid10: end bio when the device faulty (bsc#1166003).
- md/raid10: prevent access of uninitialized resync_pages offset (bsc#1166003).
- md/raid10: read balance chooses idlest disk for SSD (bsc#1166003).
- md/raid1: Fix a warning message in remove_wb() (bsc#1166003).
- md/raid1: avoid soft lockup under high load (bsc#1166003).
- md/raid1: end bio when the device faulty (bsc#1166003).
- md/raid1: fail run raid1 array when active disk less than one (bsc#1166003).
- md/raid1: fix potential data inconsistency issue with write behind device (bsc#1166003).
- md/raid1: get rid of extra blank line and space (bsc#1166003).
- md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003).
- md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003).
- md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003).
- md: add __acquires/__releases annotations to (un)lock_two_stripes (bsc#1166003).
- md: add __acquires/__releases annotations to handle_active_stripes (bsc#1166003).
- md: add a missing endianness conversion in check_sb_changes (bsc#1166003).
- md: add bitmap_abort label in md_run (bsc#1166003).
- md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003).
- md: allow last device to be forcibly removed from RAID1/RAID10 (bsc#1166003).
- md: avoid invalid memory access for array sb->dev_roles (bsc#1166003).
- md: change kabi fix patch name, from patches.kabi/md-batch-flush-requests-kabi.patch to patches.kabi/md-backport-kabi.patch
- md: convert to kvmalloc (bsc#1166003).
- md: do not call spare_active in md_reap_sync_thread if all member devices can't work (bsc#1166003).
- md: do not set In_sync if array is frozen (bsc#1166003).
- md: fix a typo s/creat/create (bsc#1166003).
- md: fix for divide error in status_resync (bsc#1166003).
- md: fix spelling typo and add necessary space (bsc#1166003).
- md: introduce mddev_create/destroy_wb_pool for the change of member device (bsc#1166003).
- md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1166003).
- md: no longer compare spare disk superblock events in super_load (bsc#1166003).
- md: raid10: Use struct_size() in kmalloc() (bsc#1166003).
- md: raid1: check rdev before reference in raid1_sync_request func (bsc#1166003).
- md: remove set but not used variable 'bi_rdev' (bsc#1166003).
- md: rename wb stuffs (bsc#1166003).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1166003).
- md: use correct type in super_1_load (bsc#1166003).
- md: use correct type in super_1_sync (bsc#1166003).
- md: use correct types in md_bitmap_print_sb (bsc#1166003).
- media: uvcvideo: Refactor teardown of uvc on USB disconnect (bsc#1164507).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: macb: Limit maximum GEM TX length in TSO (networking-stable-20_02_09).
- net: macb: Remove unnecessary alignment check for TSO (networking-stable-20_02_09).
- net: mvneta: move rx_dropped and rx_errors in per-cpu stats (networking-stable-20_02_09).
- net: systemport: Avoid RBUF stuck in Wake-on-LAN mode (networking-stable-20_02_09).
- net_sched: fix a resource leak in tcindex_set_parms() (networking-stable-20_02_09).
- nvme: Fix parsing of ANA log page (bsc#1166658).
- nvme: Translate more status codes to blk_status_t (bsc#1156510).
- nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510).
- orinoco: avoid assertion in case of NULL pointer (bsc#1051510).
- padata: always acquire cpu_hotplug_lock before pinst->lock (git-fixes).
- pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins (bsc#1051510).
- pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes).
- pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510).
- powerpc/pseries: fix of_read_drc_info_cell() to point at next record (bsc#1165980 ltc#183834).
- powerpc: fix hardware PMU exception bug on PowerVM compatibility mode systems (bsc#1056686).
- qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510).
- raid10: refactor common wait code from regular read/write request (bsc#1166003).
- raid1: factor out a common routine to handle the completion of sync write (bsc#1166003).
- raid1: simplify raid1_error function (bsc#1166003).
- raid1: use an int as the return value of raise_barrier() (bsc#1166003).
- raid5 improve too many read errors msg by adding limits (bsc#1166003).
- raid5: block failing device if raid will be failed (bsc#1166003).
- raid5: do not increment read_errors on EILSEQ return (bsc#1166003).
- raid5: do not set STRIPE_HANDLE to stripe which is in batch list (bsc#1166003).
- raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003).
- raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003).
- raid5: remove worker_cnt_per_group argument from alloc_thread_groups (bsc#1166003).
- raid5: set write hint for PPL (bsc#1166003).
- raid5: use bio_end_sector in r5_next_bio (bsc#1166003).
- raid6/test: fix a compilation error (bsc#1166003).
- raid6/test: fix a compilation warning (bsc#1166003).
- remoteproc: Initialize rproc_class before use (bsc#1051510).
- rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510).
- s390/pci: Fix unexpected write combine on resource (git-fixes).
- s390/uv: Fix handling of length extensions (git-fixes).
- staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510).
- staging: rtl8188eu: Fix potential security hole (bsc#1051510).
- staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510).
- staging: rtl8723bs: Fix potential security hole (bsc#1051510).
- tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231).
- tools: Update include/uapi/linux/fcntl.h copy from the kernel (bsc#1166003).
- usb: host: xhci: update event ring dequeue pointer on purpose (git-fixes).
- vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279)
- virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes).
- x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF (bsc#1114279).
- x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895).
- x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895).
- x86/mce/amd: Fix kobject lifetime (bsc#1114279).
- x86/mce/amd: Publish the bank pointer only after setup has succeeded (bsc#1114279).
- x86/mm: Split vmalloc_sync_all() (bsc#1165741).
- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).
- xhci: Force Maximum Packet size for Full-speed bulk devices to valid range (bsc#1051510).
- xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510).
Patchnames: openSUSE-2020-388
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929 1164078).\n- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162929 1162931).\n- CVE-2020-9383: An issue was discovered in the set_fdc in drivers/block/floppy.c that lead to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2 (bnc#1165111).\n- CVE-2019-19768: There was a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer) (bnc#1159285).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1 (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Add more codec supported Headset Button (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294 (bsc#1111666).\n- ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1 (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master (bsc#1111666).\n- ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000 (bsc#1111666).\n- ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65 headset (bsc#1111666).\n- ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666).\n- ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666).\n- ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: add quirks for Line6 Helix devices fw\u003e=2.82 (bsc#1111666).\n- ALSA: usb-audio: fix Corsair Virtuoso mixer label collision (bsc#1111666).\n- ALSA: usb-audio: unlock on error in probe (bsc#1111666).\n- ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status (bsc#1051510).\n- ASoC: dapm: Correct DAPM handling of active widgets during shutdown (bsc#1051510).\n- ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path (bsc#1051510).\n- ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output (bsc#1051510).\n- ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510).\n- ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510).\n- Add CONFIG_RAID6_PQ_BENCHMARK=y in following config files for the above change,\n- EDAC, ghes: Make platform-based whitelisting x86-only (bsc#1158187).\n- EDAC/mc: Fix use-after-free and memleaks during device removal (bsc#1114279).\n- Enable the following two patches in series.conf, and refresh the KABI patch due to previous md commit (bsc#1119680),\n- HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510).\n- Input: edt-ft5x06 - work around first register access error (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510).\n- Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list (bsc#1051510).\n- Input: synaptics - switch T470s to RMI4 by default (bsc#1051510).\n- KVM: VMX: check descriptor table exits on instruction emulation (bsc#1166104).\n- NFC: pn544: Fix a typo in a debug message (bsc#1051510).\n- NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use le16_add_cpu() (bsc#1051510).\n- PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561).\n- PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL (bsc#1161561).\n- PCI/AER: Clear only ERR_FATAL status bits during fatal recovery (bsc#1161561).\n- PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery (bsc#1161561).\n- PCI/AER: Do not clear AER bits if error handling is Firmware-First (bsc#1161561).\n- PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561).\n- PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561).\n- PCI/AER: Take reference on error devices (bsc#1161561).\n- PCI/ERR: Run error recovery callbacks for all affected devices (bsc#1161561).\n- PCI/ERR: Use slot reset if available (bsc#1161561).\n- Update \u0027drm/i915: Wean off drm_pci_alloc/drm_pci_free\u0027 (bsc#1114279) This patch fixes ../drivers/gpu/drm/i915/i915_gem.c: In function \u0027i915_gem_object_get_pages_phys\u0027: ../drivers/gpu/drm/i915/i915_gem.c:232:2: warning: return makes pointer from integer without a cast [enabled by default] introduced by commit cde29f21f04985905600b14e6936f4f023329a99.\n- Update config files. CONFIG_IPX was set on ARM. Disable as on other archs.\n- [1/2,media] uvcvideo: Refactor teardown of uvc on USB disconnect (https://patchwork.kernel.org/patch/9683663/) (bsc#1164507)\n- amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956)\n- atm: zatm: Fix empty body Clang warnings (bsc#1051510).\n- b43legacy: Fix -Wcast-function-type (bsc#1051510).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bonding/alb: properly access headers in bond_alb_xmit() (networking-stable-20_02_09).\n- config: enable BLK_DEV_SR_VENDOR on armv7hl (bsc#1164632)\n- cpufreq: powernv: Fix unsafe notifiers (bsc#1065729).\n- cpufreq: powernv: Fix use-after-free (bsc#1065729).\n- crypto: pcrypt - Fix user-after-free on module unload (git-fixes).\n- dmaengine: coh901318: Fix a double lock bug in dma_tc_handle() (bsc#1051510).\n- driver core: Print device when resources present in really_probe() (bsc#1051510).\n- driver core: platform: Prevent resouce overflow from causing infinite loops (bsc#1051510).\n- driver core: platform: fix u32 greater or equal to zero comparison (bsc#1051510).\n- drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drm/amd/dm/mst: Ignore payload update failures (bsc#1112178)\n- drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510).\n- drm/i915/gvt: Fix orphan vgpu dmabuf_objs\u0027 lifetime (git-fixes).\n- drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits (git-fixes).\n- drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279)\n- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)\n- drm/i915: Program MBUS with rmw during initialization (git-fixes).\n- drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510).\n- drm/nouveau/disp/nv50-: prevent oops when no channel method map provided (bsc#1051510).\n- drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from fw (bsc#1051510).\n- drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets (git-fixes).\n- drm/sun4i: Fix DE2 VI layer format support (git-fixes).\n- drm/sun4i: de2/de3: Remove unsupported VI layer formats (git-fixes).\n- drm: remove the newline for CRC source name (bsc#1051510).\n- fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003).\n- firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes).\n- firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes).\n- firmware: imx: scu: Ensure sequential TX (git-fixes).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510).\n- ibmvnic: Do not process device remove during device reset (bsc#1065729).\n- ibmvnic: Warn unknown speed message only when carrier is present (bsc#1065729).\n- iommu/amd: Check feature support bit before accessing MSI capability registers (bsc#1166101).\n- iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102).\n- iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump (bsc#1141895).\n- iommu/dma: Fix MSI reservation allocation (bsc#1166730).\n- iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page (bsc#1166732).\n- iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103).\n- iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733).\n- iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734).\n- iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint (bsc#1166731).\n- iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint (bsc#1166735).\n- iwlegacy: Fix -Wcast-function-type (bsc#1051510).\n- iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices (bsc#1166632).\n- iwlwifi: mvm: Fix thermal zone registration (bsc#1051510).\n- kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled (bsc#1141895).\n- kexec: Allocate decrypted control pages for kdump if SME is enabled (bsc#1141895).\n- lib/raid6: add missing include for raid6test (bsc#1166003).\n- lib/raid6: add option to skip algo benchmarking (bsc#1166003).\n- lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003).\n- libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields (bsc#1165929).\n- libnvdimm/pfn_dev: Do not clear device memmap area during generic namespace probe (bsc#1165929 bsc#1165950).\n- libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929).\n- md raid0/linear: Mark array as \u0027broken\u0027 and fail BIOs if a member is gone (bsc#1166003).\n- md-batch-flush-requests-kabi.patch\n- md-batch-flush-requests.patch\n- md-bitmap: create and destroy wb_info_pool with the change of backlog (bsc#1166003).\n- md-bitmap: create and destroy wb_info_pool with the change of bitmap (bsc#1166003).\n- md-bitmap: small cleanups (bsc#1166003).\n- md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during reshaping stage (bsc#1166003).\n- md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003).\n- md-cluster/raid10: do not call remove_and_add_spares during reshaping stage (bsc#1166003).\n- md-cluster/raid10: resize all the bitmaps before start reshape (bsc#1166003).\n- md-cluster/raid10: support add disk under grow mode (bsc#1166003).\n- md-cluster: introduce resync_info_get interface for sanity check (bsc#1166003).\n- md-cluster: remove suspend_info (bsc#1166003).\n- md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted (bsc#1166003).\n- md-linear: use struct_size() in kzalloc() (bsc#1166003).\n- md/bitmap: avoid race window between md_bitmap_resize and bitmap_file_clear_bit (bsc#1166003).\n- md/bitmap: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1166003).\n- md/raid0: Fix an error message in raid0_make_request() (bsc#1166003).\n- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1166003).\n- md/raid10: end bio when the device faulty (bsc#1166003).\n- md/raid10: prevent access of uninitialized resync_pages offset (bsc#1166003).\n- md/raid10: read balance chooses idlest disk for SSD (bsc#1166003).\n- md/raid1: Fix a warning message in remove_wb() (bsc#1166003).\n- md/raid1: avoid soft lockup under high load (bsc#1166003).\n- md/raid1: end bio when the device faulty (bsc#1166003).\n- md/raid1: fail run raid1 array when active disk less than one (bsc#1166003).\n- md/raid1: fix potential data inconsistency issue with write behind device (bsc#1166003).\n- md/raid1: get rid of extra blank line and space (bsc#1166003).\n- md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003).\n- md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003).\n- md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003).\n- md: add __acquires/__releases annotations to (un)lock_two_stripes (bsc#1166003).\n- md: add __acquires/__releases annotations to handle_active_stripes (bsc#1166003).\n- md: add a missing endianness conversion in check_sb_changes (bsc#1166003).\n- md: add bitmap_abort label in md_run (bsc#1166003).\n- md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003).\n- md: allow last device to be forcibly removed from RAID1/RAID10 (bsc#1166003).\n- md: avoid invalid memory access for array sb-\u003edev_roles (bsc#1166003).\n- md: change kabi fix patch name, from patches.kabi/md-batch-flush-requests-kabi.patch to patches.kabi/md-backport-kabi.patch\n- md: convert to kvmalloc (bsc#1166003).\n- md: do not call spare_active in md_reap_sync_thread if all member devices can\u0027t work (bsc#1166003).\n- md: do not set In_sync if array is frozen (bsc#1166003).\n- md: fix a typo s/creat/create (bsc#1166003).\n- md: fix for divide error in status_resync (bsc#1166003).\n- md: fix spelling typo and add necessary space (bsc#1166003).\n- md: introduce mddev_create/destroy_wb_pool for the change of member device (bsc#1166003).\n- md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003).\n- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1166003).\n- md: no longer compare spare disk superblock events in super_load (bsc#1166003).\n- md: raid10: Use struct_size() in kmalloc() (bsc#1166003).\n- md: raid1: check rdev before reference in raid1_sync_request func (bsc#1166003).\n- md: remove set but not used variable \u0027bi_rdev\u0027 (bsc#1166003).\n- md: rename wb stuffs (bsc#1166003).\n- md: return -ENODEV if rdev has no mddev assigned (bsc#1166003).\n- md: use correct type in super_1_load (bsc#1166003).\n- md: use correct type in super_1_sync (bsc#1166003).\n- md: use correct types in md_bitmap_print_sb (bsc#1166003).\n- media: uvcvideo: Refactor teardown of uvc on USB disconnect (bsc#1164507).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: macb: Limit maximum GEM TX length in TSO (networking-stable-20_02_09).\n- net: macb: Remove unnecessary alignment check for TSO (networking-stable-20_02_09).\n- net: mvneta: move rx_dropped and rx_errors in per-cpu stats (networking-stable-20_02_09).\n- net: systemport: Avoid RBUF stuck in Wake-on-LAN mode (networking-stable-20_02_09).\n- net_sched: fix a resource leak in tcindex_set_parms() (networking-stable-20_02_09).\n- nvme: Fix parsing of ANA log page (bsc#1166658).\n- nvme: Translate more status codes to blk_status_t (bsc#1156510).\n- nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510).\n- orinoco: avoid assertion in case of NULL pointer (bsc#1051510).\n- padata: always acquire cpu_hotplug_lock before pinst-\u003elock (git-fixes).\n- pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins (bsc#1051510).\n- pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes).\n- pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510).\n- powerpc/pseries: fix of_read_drc_info_cell() to point at next record (bsc#1165980 ltc#183834).\n- powerpc: fix hardware PMU exception bug on PowerVM compatibility mode systems (bsc#1056686).\n- qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510).\n- raid10: refactor common wait code from regular read/write request (bsc#1166003).\n- raid1: factor out a common routine to handle the completion of sync write (bsc#1166003).\n- raid1: simplify raid1_error function (bsc#1166003).\n- raid1: use an int as the return value of raise_barrier() (bsc#1166003).\n- raid5 improve too many read errors msg by adding limits (bsc#1166003).\n- raid5: block failing device if raid will be failed (bsc#1166003).\n- raid5: do not increment read_errors on EILSEQ return (bsc#1166003).\n- raid5: do not set STRIPE_HANDLE to stripe which is in batch list (bsc#1166003).\n- raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003).\n- raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003).\n- raid5: remove worker_cnt_per_group argument from alloc_thread_groups (bsc#1166003).\n- raid5: set write hint for PPL (bsc#1166003).\n- raid5: use bio_end_sector in r5_next_bio (bsc#1166003).\n- raid6/test: fix a compilation error (bsc#1166003).\n- raid6/test: fix a compilation warning (bsc#1166003).\n- remoteproc: Initialize rproc_class before use (bsc#1051510).\n- rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510).\n- s390/pci: Fix unexpected write combine on resource (git-fixes).\n- s390/uv: Fix handling of length extensions (git-fixes).\n- staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8188eu: Fix potential security hole (bsc#1051510).\n- staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8723bs: Fix potential security hole (bsc#1051510).\n- tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231).\n- tools: Update include/uapi/linux/fcntl.h copy from the kernel (bsc#1166003).\n- usb: host: xhci: update event ring dequeue pointer on purpose (git-fixes).\n- vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279)\n- virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes).\n- x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF (bsc#1114279).\n- x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895).\n- x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895).\n- x86/mce/amd: Fix kobject lifetime (bsc#1114279).\n- x86/mce/amd: Publish the bank pointer only after setup has succeeded (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xhci: Force Maximum Packet size for Full-speed bulk devices to valid range (bsc#1051510).\n- xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-388",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0388-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0388-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0388-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/"
},
{
"category": "self",
"summary": "SUSE Bug 1044231",
"url": "https://bugzilla.suse.com/1044231"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1056686",
"url": "https://bugzilla.suse.com/1056686"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1111974",
"url": "https://bugzilla.suse.com/1111974"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1119680",
"url": "https://bugzilla.suse.com/1119680"
},
{
"category": "self",
"summary": "SUSE Bug 1141895",
"url": "https://bugzilla.suse.com/1141895"
},
{
"category": "self",
"summary": "SUSE Bug 1156510",
"url": "https://bugzilla.suse.com/1156510"
},
{
"category": "self",
"summary": "SUSE Bug 1158187",
"url": "https://bugzilla.suse.com/1158187"
},
{
"category": "self",
"summary": "SUSE Bug 1159285",
"url": "https://bugzilla.suse.com/1159285"
},
{
"category": "self",
"summary": "SUSE Bug 1161561",
"url": "https://bugzilla.suse.com/1161561"
},
{
"category": "self",
"summary": "SUSE Bug 1162929",
"url": "https://bugzilla.suse.com/1162929"
},
{
"category": "self",
"summary": "SUSE Bug 1162931",
"url": "https://bugzilla.suse.com/1162931"
},
{
"category": "self",
"summary": "SUSE Bug 1164078",
"url": "https://bugzilla.suse.com/1164078"
},
{
"category": "self",
"summary": "SUSE Bug 1164507",
"url": "https://bugzilla.suse.com/1164507"
},
{
"category": "self",
"summary": "SUSE Bug 1164632",
"url": "https://bugzilla.suse.com/1164632"
},
{
"category": "self",
"summary": "SUSE Bug 1165111",
"url": "https://bugzilla.suse.com/1165111"
},
{
"category": "self",
"summary": "SUSE Bug 1165741",
"url": "https://bugzilla.suse.com/1165741"
},
{
"category": "self",
"summary": "SUSE Bug 1165873",
"url": "https://bugzilla.suse.com/1165873"
},
{
"category": "self",
"summary": "SUSE Bug 1165929",
"url": "https://bugzilla.suse.com/1165929"
},
{
"category": "self",
"summary": "SUSE Bug 1165950",
"url": "https://bugzilla.suse.com/1165950"
},
{
"category": "self",
"summary": "SUSE Bug 1165980",
"url": "https://bugzilla.suse.com/1165980"
},
{
"category": "self",
"summary": "SUSE Bug 1165984",
"url": "https://bugzilla.suse.com/1165984"
},
{
"category": "self",
"summary": "SUSE Bug 1165985",
"url": "https://bugzilla.suse.com/1165985"
},
{
"category": "self",
"summary": "SUSE Bug 1166003",
"url": "https://bugzilla.suse.com/1166003"
},
{
"category": "self",
"summary": "SUSE Bug 1166101",
"url": "https://bugzilla.suse.com/1166101"
},
{
"category": "self",
"summary": "SUSE Bug 1166102",
"url": "https://bugzilla.suse.com/1166102"
},
{
"category": "self",
"summary": "SUSE Bug 1166103",
"url": "https://bugzilla.suse.com/1166103"
},
{
"category": "self",
"summary": "SUSE Bug 1166104",
"url": "https://bugzilla.suse.com/1166104"
},
{
"category": "self",
"summary": "SUSE Bug 1166632",
"url": "https://bugzilla.suse.com/1166632"
},
{
"category": "self",
"summary": "SUSE Bug 1166658",
"url": "https://bugzilla.suse.com/1166658"
},
{
"category": "self",
"summary": "SUSE Bug 1166730",
"url": "https://bugzilla.suse.com/1166730"
},
{
"category": "self",
"summary": "SUSE Bug 1166731",
"url": "https://bugzilla.suse.com/1166731"
},
{
"category": "self",
"summary": "SUSE Bug 1166732",
"url": "https://bugzilla.suse.com/1166732"
},
{
"category": "self",
"summary": "SUSE Bug 1166733",
"url": "https://bugzilla.suse.com/1166733"
},
{
"category": "self",
"summary": "SUSE Bug 1166734",
"url": "https://bugzilla.suse.com/1166734"
},
{
"category": "self",
"summary": "SUSE Bug 1166735",
"url": "https://bugzilla.suse.com/1166735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19768 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8647 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8649 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8649/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9383 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9383/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2020-03-27T05:20:02Z",
"generator": {
"date": "2020-03-27T05:20:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0388-1",
"initial_release_date": "2020-03-27T05:20:02Z",
"revision_history": [
{
"date": "2020-03-27T05:20:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-devel-4.12.14-lp151.28.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-docs-4.12.14-lp151.28.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp151.28.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-macros-4.12.14-lp151.28.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-source-4.12.14-lp151.28.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-default-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-19768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19768",
"url": "https://www.suse.com/security/cve/CVE-2019-19768"
},
{
"category": "external",
"summary": "SUSE Bug 1159285 for CVE-2019-19768",
"url": "https://bugzilla.suse.com/1159285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-03-27T05:20:02Z",
"details": "moderate"
}
],
"title": "CVE-2019-19768"
},
{
"cve": "CVE-2020-8647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8647"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8647",
"url": "https://www.suse.com/security/cve/CVE-2020-8647"
},
{
"category": "external",
"summary": "SUSE Bug 1162929 for CVE-2020-8647",
"url": "https://bugzilla.suse.com/1162929"
},
{
"category": "external",
"summary": "SUSE Bug 1164078 for CVE-2020-8647",
"url": "https://bugzilla.suse.com/1164078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-03-27T05:20:02Z",
"details": "moderate"
}
],
"title": "CVE-2020-8647"
},
{
"cve": "CVE-2020-8649",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8649"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8649",
"url": "https://www.suse.com/security/cve/CVE-2020-8649"
},
{
"category": "external",
"summary": "SUSE Bug 1162929 for CVE-2020-8649",
"url": "https://bugzilla.suse.com/1162929"
},
{
"category": "external",
"summary": "SUSE Bug 1162931 for CVE-2020-8649",
"url": "https://bugzilla.suse.com/1162931"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-03-27T05:20:02Z",
"details": "moderate"
}
],
"title": "CVE-2020-8649"
},
{
"cve": "CVE-2020-9383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9383"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9383",
"url": "https://www.suse.com/security/cve/CVE-2020-9383"
},
{
"category": "external",
"summary": "SUSE Bug 1165111 for CVE-2020-9383",
"url": "https://bugzilla.suse.com/1165111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.44.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.44.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-03-27T05:20:02Z",
"details": "moderate"
}
],
"title": "CVE-2020-9383"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…